Home | Amazing | Today | Tags | Publishers | Years | Search 
SharePoint 2010 for Project Management
SharePoint 2010 for Project Management
Do you find yourself asking for more time whenever you work on a project? Do you ever get the extra time you asked for? Well, if you’re like me, you rarely get the extra time you need from your customers. This got me thinking about how I can buy more time for my projects. I decided to find out if I could gain more time by reducing...
Programming Interactivity
Programming Interactivity

This book is broken into three parts. The first introduces the three projects that will be used throughout this book, the second introduces some of the most common themes in creating interaction in designs and applications, and the third introduces some of the more advanced topics that you may want to explore further. Also...

jQuery Mobile: Up and Running
jQuery Mobile: Up and Running
This book is the ideal companion for web designers and developers wanting to create mobile experiences using jQuery Mobile. jQuery Mobile has appeared in the market to solve one problem: dozens of mobile platforms and browsers and the need to create compatible interfaces for all of them. This book...
Enterprise JavaBeans (Java Series)
Enterprise JavaBeans (Java Series)
This book is about Enterprise JavaBeans 1.1 and 2.0 the second and third versions of the Enterprise JavaBeans specification. Just as the Java platform has revolutionized the way we think about software development, Enterprise JavaBeans has revolutionized the way we think about developing mission-critical enterprise...
Exim: The Mail Transfer Agent
Exim: The Mail Transfer Agent
Back in 1995, the central computing services at Cambridge University were running a variety of mail transfer agents, including Sendmail, Smail 3, and PP. Some years before, I had converted the systems whose mail I managed from Sendmail to Smail to make it easier to handle the special requir ements of the early 1990s...
Getting Started with OAuth 2.0
Getting Started with OAuth 2.0
I’ve been working with web-based APIs since 1999, building SOAP-based web services for internal IT applications and helping thousands of developers using Google’s RESTbased APIs for Google Calendar, Picasa Web Albums, YouTube, and more. Each of these APIs has required authorization from users to act on their behalf. Developers...
Programming iOS 5: Fundamentals of iPhone, iPad, and iPod touch Development
Programming iOS 5: Fundamentals of iPhone, iPad, and iPod touch Development
With the advent of version 2 of the iPhone system, Apple proved they could do a remarkable thing — adapt their existing Cocoa computer application programming framework to make applications for a touch-based device with limited memory and speed and a dauntingly tiny display. The resulting Cocoa Touch framework, in...
ActionScript Developer's Guide to PureMVC
ActionScript Developer's Guide to PureMVC

Too often in the development of a large application, the developer must stop and think about where to find some class he needs, where some new class should go, and how to wire them up in such a way that gets data from wherever it lives to a display so the user can interact with it or vice-versa.

Arduino Cookbook
Arduino Cookbook
This book was written by Michael Margolis with Nick Weldin to help you explore the amazing things you can do with Arduino. Arduino is a family of microcontrollers (tiny computers) and a software creation environment that makes it easy for you to create programs (called sketches) that can interact with the...
iPod: The Missing Manual
iPod: The Missing Manual
What a difference a decade makes. When Apple introduced the very first iPod back in October 2001, it was a bulky chunk of white plastic, chrome, and glass that held a mere 5 gigabytes of music. But its concept was simple and enticing: you could carry 1,000 songs around in your pocket. And people did.
 
Hacking and Securing iOS Applications: Stealing Data, Hijacking Software, and How to Prevent It
Hacking and Securing iOS Applications: Stealing Data, Hijacking Software, and How to Prevent It
Data is stolen; this is no uncommon occurrence. The electronic information age has made the theft of data a very lucrative occupation. Whether it’s phishing scams or largescale data breaches, criminals stand to greatly benefit from electronic crimes, making their investment well worth the risk. When I say that this occurrence is not...
Inside Cyber Warfare: Mapping the Cyber Underworld
Inside Cyber Warfare: Mapping the Cyber Underworld
I was recently invited to participate in a cyber security dinner discussion by a few members of a well-known Washington, DC, think tank. The idea was that we could enjoy a fine wine and a delicious meal while allowing our hosts to pick our brains about this “cyber warfare stuff.” It seems that the new...
Result Page: 171 170 169 168 167 166 165 164 163 162 161 160 159 158 157 156 155 154 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy